Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

12th Grade

25 Qs

quiz-placeholder

Similar activities

Quiz sulle VPN

Quiz sulle VPN

12th Grade

22 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

POCS-Ch. 3.2 (Vocab)

POCS-Ch. 3.2 (Vocab)

7th - 12th Grade

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Networking v6 Ch 13 Quiz Review

Networking v6 Ch 13 Quiz Review

9th - 12th Grade

25 Qs

Networking Essentials Chapter 6 Review

Networking Essentials Chapter 6 Review

9th Grade - University

25 Qs

CIW Network Technology Lesson 6

CIW Network Technology Lesson 6

12th Grade

25 Qs

Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

Assessment

Quiz

Computers

12th Grade

Medium

S4, S1

Standards-aligned

Created by

Cyber Professor - Mr. B

Used 6+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

What is the main means by which anti-virus software identifies infected files?

defintions

signatures

heuristic behavior

the infected files are in purple

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Usually the the first method of multifactor authentication is a strong password. Choose a common second method for authenication. (Choose the two best methods)

A Retna Scan

A thumb or finger print

a punch card

a school id card

3.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Media Image

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.

Which of the following models could this office be using? (Select two.)

Standalone

Client-server

Azure AD

Active Directory

Workgroup

Tags

S4

4.

FILL IN THE BLANK QUESTION

2 mins • 3 pts

True or False: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

An attack with the intention to make the target system unavailable to legitimate users is called what type of attack?

Denial of Service

Ransomware

Spyware

Botnet

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.

Which command can you use to disable this account?

usermod -d joer

usermod -u joer

usermod -L joer

usermod -l joer

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

What authentication standard is used by active-duty US military personnel?

CAC

PIV

COTP

SIM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?